New Report Warns of 68% Of Actively Serving Phishing Kits Protected by CloudFlare

By Published On: December 4, 2025

A disturbing new report uncovers a significant shift in the landscape of online phishing operations, revealing that a staggering 68% of actively serving phishing kits are now protected by Cloudflare. This development poses a substantial challenge for cybersecurity professionals and incident responders, as legitimate services are being leveraged to cloak malicious activity.

Recent research identified over 42,000 unique URLs and domains actively hosting phishing kits, command-and-control (C2) infrastructure, and systems designed for delivering malicious payloads. This scale and the inherent sophistication of these operations mark a concerning evolution from the less intricate phishing attempts of the past.

The Evolving Threat: Phishing Kits and Cloudflare Protection

Traditional phishing often involved simple, easily identifiable tactics. However, the current threat landscape showcases a higher level of operational security from attackers. The utilization of services like Cloudflare, which offers robust CDN (Content Delivery Network), DDoS protection, and SSL/TLS encryption, provides several advantages for malicious actors.

  • Obscuring Origin Servers: Cloudflare acts as a reverse proxy, effectively hiding the actual IP address of the phishing server. This makes it significantly harder for security teams to identify and shut down the underlying infrastructure.
  • Increased Resilience: By distributing content across multiple servers and mitigating DDoS attacks, Cloudflare inadvertently provides malicious sites with enhanced uptime and resistance to takedown attempts.
  • Legitimacy by Association: When a phishing site is protected by a reputable service like Cloudflare, it can appear more legitimate to an unsuspecting user, increasing the likelihood of engagement.
  • SSL/TLS Certificates: Cloudflare often provides free SSL/TLS certificates, leading to phishing sites displaying the padlock icon in browsers. This visual cue, often misinterpreted as a sign of trustworthiness, can deceive users into believing they are on a secure and legitimate website.

The Scale of the Problem: 42,000+ Malicious Domains

The report’s revelation of over 42,000 validated URLs and domains actively serving malicious infrastructure underscores the sheer volume of ongoing attacks. This isn’t just about isolated incidents; it represents a pervasive and organized effort by threat actors. These domains are not simply hosting static phishing pages; they are often integrated with backend systems for:

  • Data Exfiltration: Collecting stolen credentials and personal information.
  • Command and Control: Managing botnets and delivering further malicious instructions to compromised systems.
  • Payload Delivery: Distributing malware, ransomware, or other harmful software.

Why Cloudflare? The Double-Edged Sword of Protection

Cloudflare’s services are designed to enhance web security and performance for legitimate users. However, the very features that make it so effective become attractive to threat actors seeking to evade detection and maintain persistence. While Cloudflare actively combats abuse on its platform, the sheer volume of websites it protects makes comprehensive monitoring and immediate takedown of every malicious page a monumental challenge.

It’s crucial to understand that Cloudflare is not complicit in these attacks. Their platform is being exploited by malicious actors, much like any widely adopted internet service can be. The challenge lies in distinguishing legitimate use from abusive activity at scale, particularly when attackers employ sophisticated cloaking techniques.

Remediation Actions for Organizations and Users

Given the increasing sophistication of phishing attacks, particularly those leveraging legitimate services, proactive measures are paramount for both organizations and individual users.

For Organizations:

  • Enhance Email Security Gateways: Implement advanced email filtering solutions that can detect and block sophisticated phishing attempts, including those originating from seemingly legitimate sources or those using obscured infrastructure.
  • Robust DNS Filtering: Deploy DNS-level security solutions that can block access to known malicious domains, regardless of their underlying hosting or CDN provider.
  • Endpoint Detection and Response (EDR): Utilize EDR solutions to monitor endpoints for suspicious activity, even if a user falls victim to a phishing attempt, allowing for rapid detection and response to potential compromises.
  • Security Awareness Training: Regularly educate employees on recognizing phishing attempts, including those that appear legitimate with SSL certificates or familiar branding. Emphasize verification processes for unusual requests.
  • Multi-Factor Authentication (MFA): Implement MFA across all critical systems and applications. Even if credentials are stolen via phishing, MFA acts as a crucial secondary barrier.
  • Threat Intelligence Feeds: Subscribe to and integrate high-quality threat intelligence feeds that provide timely information on newly identified phishing domains and C2 infrastructure.
  • Incident Response Plan: Develop and regularly test a comprehensive incident response plan for phishing and credential compromise scenarios.

For Individual Users:

  • Be Skeptical of Unsolicited Communications: Always question emails, messages, or calls asking for personal information, login credentials, or urging immediate action.
  • Verify Sender Information: Carefully inspect email sender addresses. Look for slight misspellings or unusual domain names.
  • Hover Before Clicking: Before clicking on any link, hover your mouse over it (on a desktop) to see the actual URL. Be wary of shortened links.
  • Use Strong, Unique Passwords and MFA: Employ strong, complex passwords for all online accounts and enable multi-factor authentication whenever possible.
  • Keep Software Updated: Ensure your operating system, web browser, and security software are always up to date to protect against known vulnerabilities.
  • Report Suspicious Activity: If you suspect a phishing attempt, report it to your IT department (if applicable) or the relevant service provider.

The Path Forward: Collaborative Defense

The rise of phishing kits protected by legitimate services like Cloudflare underscores the need for a collaborative approach to cybersecurity. This involves not only robust technological defenses and user education but also cooperation between security researchers, service providers, and law enforcement agencies to identify, track, and dismantle these increasingly sophisticated malicious operations.

The battle against phishing is continuous. By understanding the evolving tactics of threat actors and implementing proactive, layered security measures, we can collectively enhance our resilience against these persistent digital threats.

Share this article

Leave A Comment